Unlock instant, AI-driven research and patent intelligence for your innovation.

file scanning system

A file scanning and file technology, applied in the field of network security, can solve the problems of reducing file scanning efficiency and limited scanning ability, and achieve the effect of improving scanning efficiency and accuracy

Active Publication Date: 2015-08-12
BEIJING QIHOO TECH CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the scanning capabilities of third-party antivirus software are limited. As the number of sample files increases, this method will obviously reduce file scanning efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • file scanning system
  • file scanning system
  • file scanning system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0047] Embodiments of the invention may be applied to computer systems / servers that are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments and / or configurations suitable for use with computer systems / servers include, but are not limited to: personal computer systems, server computer systems, thin clients, thick cli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a file scanning system to solve the problem that file scanning efficiency is low. The system comprises a client-side and a server-side, wherein the client-side comprises a file upload module, and the server-side comprises a storage server, a file download server and a scanning server. The storage server comprises a database, and the file download server comprises a file download module. The scanning server comprises a file scanning device which comprises a probability calculation module, an ordering module, an extraction module and a scanning module, wherein the extraction module is suitable for obtaining the number K of scanned files and extracting K to-be-scanned sample files high in suspicious probability from ordered to-be-scanned sample files, and K is a positive integer. The scanning module is suitable for scanning the K to-be-scanned sample files and identifying suspicious sample files in the K to-be-scanned sample files. The file scanning system improves scanning efficiency, can identify the suspicious sample files as much as possible, and improves accuracy in scanning the sample files.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a file scanning system. Background technique [0002] Malicious program is an umbrella term for any software program intentionally created to perform unauthorized and often harmful acts. Computer viruses, backdoor programs, keyloggers, password stealers, Word and Excel macro viruses, boot sector viruses, script viruses (batch, windows shell, java, etc.), Trojan horses, crimeware, spyware and adware, etc., These are examples of what could be called malicious programs. [0003] In order to prevent malicious programs from attacking the computer, it is generally necessary to install anti-virus software on the computer to scan files in the system to identify and kill malicious programs. [0004] In order to quickly identify and kill malicious programs, and at the same time reduce the resource consumption of the client, more and more current security protection software uses...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 于春功贺超
Owner BEIJING QIHOO TECH CO LTD